Secure telemetric link
First Claim
Patent Images
1. A medical network comprising:
- an implantable medical device (IMD) having a first identifier unique to the IMD and a first device key unique to the IMD;
an external device having a second identifier unique to the external device and a second device key unique to the external device; and
a machine-readable storage medium separate from the IMD that stores authentication data associated with the IMD, wherein the authentication data includes at least the first identifier unique to the IMD and the first device key unique to the IMD,wherein the external device obtains the authentication data associated with the IMD from the machine-readable storage medium, generates a first communication that includes at least the first identifier and the second identifier and is secured with the first device key, and transmits the first communication,wherein the IMD decrypts the first communication using the first device key to verify the first device key was used to secure the first communication, provides the external device with a network key upon verifying that the first device key was used to secure the first communication,wherein subsequent communications between the IMD and the external device are secured using the network key.
0 Assignments
0 Petitions
Accused Products
Abstract
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and from implantable medical devices in a body area network. In certain embodiments, encryption, message integrity, and message freshness are provided through use of token-like nonces and ephemeral session-keys derived from device identification numbers and pseudorandom numbers.
-
Citations
12 Claims
-
1. A medical network comprising:
-
an implantable medical device (IMD) having a first identifier unique to the IMD and a first device key unique to the IMD; an external device having a second identifier unique to the external device and a second device key unique to the external device; and a machine-readable storage medium separate from the IMD that stores authentication data associated with the IMD, wherein the authentication data includes at least the first identifier unique to the IMD and the first device key unique to the IMD, wherein the external device obtains the authentication data associated with the IMD from the machine-readable storage medium, generates a first communication that includes at least the first identifier and the second identifier and is secured with the first device key, and transmits the first communication, wherein the IMD decrypts the first communication using the first device key to verify the first device key was used to secure the first communication, provides the external device with a network key upon verifying that the first device key was used to secure the first communication, wherein subsequent communications between the IMD and the external device are secured using the network key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A medical network comprising:
-
an implantable medical device (IMD) having a first identifier unique to the IMD and a first device key unique to the IMD; an external device having a second identifier unique to the external device and a second device key unique to the external device; and a machine-readable storage medium separate from the IMD that stores authentication data associated with the IMD, wherein the authentication data includes at least the first identifier unique to the IMD and the first device key unique to the IMD, wherein the external device obtains the authentication data associated with the IMD from the machine-readable storage medium, generates a first communication that includes at least the first identifier and the second identifier and is secured with the first device key, and transmits the first communication, wherein the IMD decrypts the first communication using the first device key to verify the first device key was used to secure the first communication, obtains a network key from the external device after verifying that the first device key was used to secure the first communication, wherein subsequent communications between the IMD and the external device are secured using the network key. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification